Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data

  title={Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data},
  author={M. Chuah and W. Hu},
  journal={2011 31st International Conference on Distributed Computing Systems Workshops},
As Cloud Computing technology becomes more mature, many organizations and individuals are interested in storing more sensitive data e.g. personal health records, customers related information in the cloud. Such sensitive data needs to be encrypted before it is outsourced to the cloud. Typically, the cloud servers also need to support a keyword search feature for these encrypted files. Traditional searchable encryption schemes typically only support exact keyword matches. However, users… CONTINUE READING
Highly Cited
This paper has 97 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 62 extracted citations

Trust, Privacy and Security in Digital Business

Lecture Notes in Computer Science • 2017
View 7 Excerpts
Highly Influenced

Cuckoo-Filter Based Privacy-Aware Search over Encrypted Cloud Data

2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN) • 2015
View 20 Excerpts
Highly Influenced

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

IEEE INFOCOM 2014 - IEEE Conference on Computer Communications • 2014
View 4 Excerpts
Highly Influenced

Achieving Secure and Effective Search Services in Cloud Computing

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) • 2018
View 2 Excerpts

Semantic-Aware Searching Over Encrypted Data for Cloud Computing

IEEE Transactions on Information Forensics and Security • 2018
View 3 Excerpts

98 Citations

Citations per Year
Semantic Scholar estimates that this publication has 98 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 19 references

B-Tree: An All Purpose Index Structure for String Similiarity Search Based on Edit Distance

Z. Zhang
Proceedings of ACM SIGMOD • 2010
View 9 Excerpts
Highly Influenced

Searchable symmetric encryption: improved definition and efficient constrcutions

R. Cutmola, J. A. Garay, S. Kamara, R. Ostrovsky
Proceedings of ACM CCS, • 2006
View 4 Excerpts
Highly Influenced

Space-Constrained Gram-Based Indexing for Efficient Approximate String Search

2009 IEEE 25th International Conference on Data Engineering • 2009
View 2 Excerpts

Efficient Merging and Filtering Algorithms for Approximate String Searches

2008 IEEE 24th International Conference on Data Engineering • 2008
View 2 Excerpts

Determinstic and efficiently searchable encryption ”

D. Wagner Song, A. Perrig
Proceedings of Crypto • 2007

Multi-Dimensional Range Query over Encrypted Data

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 1 Excerpt

Similar Papers

Loading similar papers…